go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: October 2016

Go to Homepage [0], contents or to navigation menu



small update

Hi all.
This is a small notification to tell you that klite codecs are at 12.50, this is being released before update days on wednesday my time but one has not come for a while.

Comments (0)

Notes on blindness VR

Posted this to mpobility discuss and my own blog, thoughts are welcome.


Hello folks,

I saw this on the apple vis website. From the description of the app, it takes some things from a blind person making a diary from having some site and eventually losing their site. Comments indicate that this game is not accessible to the blind and I don’t think that it is the point for it to be accessible to the blind. Anyone sighted on this list, using IOS, may want to check this out and let me know what you think. I’d be curious to see if anything mobility related is discussed here. Link to applevis. Enjoy!

Comments (0)

updates this week

Hi all.
Flash player has an out of band update, and win10 has some out of band security updates and a feature improvement, itunes and icloud have updates and that means the ios line of products are not long to follow.
It also appears that a event for apple has happened but who knows what that actually is.

Comments (0)

sonnar game update

Hi all prospective audio gamers out there.
Well its been a long long time since a news update.
Before we start, this post is going out to many locations at once.
A few of you may have got shorter posts about whats going on depending on your position on the net and so on.
I know at least 1 or 2 others will get a taylered post asking for something.
With this out of the way.
1. Kickstarter.
Its no secret we need at least 5000 dollars to 50000 dollars of funding.
5000 is minimal for 5 extra games plus another one which will be a full on rpg and which you need to buy.
Right now its not finalised but I will get more info when that comes on stream and thats coming soon.

  1. descussion group.
    the link to join is
    https://groups.io/g/sonnargames
    This will discuss everything related to sonnar interactive I think thats what it is or it may be sonnar, I forget.
    There is a news feed at sonnar.nz
    It is currently offline but should be up tomorrow.
    Also there is a forum on audiogamehub.com which all users are encouraged to join to post issues on etc currently looking for moderators.
    The descussion group is also looking for moderators.
    Email me sm dot everiss at gmail dot com for info.
    Sadly I can’t just put my email as a propper address or I’d get spammed to death!
  2. completion of the hub.
    After a month the compaign will be closed off and attempted completion should be finnished on feburary some time.
    Several new projects are happening in the rpg and adventure airieas.
    I can’t tell our secret formula but I do know that one is a roguelike rpg audio with pictorials for sighted people.
    I will continue to update all of you when more news comes in.
    Oh and before I go, please keep donating and sending fan mail we appreciate it greatly.

Comments (0)

important updates for the month

Hi all.
Well so much security news this week that I didn’t write my own update list.
For all users oricle java 8.11 and 8.12 are out.
Usual consumers can get 8.11 for security those that develop it or are advanced users can get 8.12 with extra features if they know how.
klite has a new update to its codecs as does skype.
For those with newer nvidia and amd video cards those are updated to.

Comments (0)

comments on posts

Hi.
Going back to my last article it seems hackers used iot devices with telnet connections active.
You should always change the default passwords, and you shouldn’t allow telnet to any of your devices.
A security cammera does need access so you can view that on a secured server but your tv etc shouldn’t need to access anything unless its on and you are using it.
This is probably a problem for those of use who have devices with weird custom built oses but for droid devices they should be easy enough to secure.
Compaired to a pc, the most you will need to pay for malware protection is 9 bucks, so 20 bucks could probably buy you the diagnostic and security packages you will ever need for your device, compaired to a pc thats a pritty small price to pay.
Sadly the hacker used an abandoned mud game connection to get into, securing your telnet games well needs doing.
Sadly all of these muds and such do use telnet, it looks like using default ports is out.
In all cases, its recomended that unless you need remote access to something that it be switched off.
If you really need unobstructed service from a device and it can’t easily be secured, maybe it should be connected to a device that can.
An epc or low cost computer costs under 300 bucks if pc.
Less if droid or pie unit.
A raspberry pie media server at least in new zealand is 70 dollars at stock level.

Back to the current story, I am undecided, did this guy do anything wrong.
If this anything to go on, it may be nothing or the guy has done something totally bad.
It seems that if the government wants you they can make things up and we don’t know or will ever know what the truth actually is.
On the flipside, it is known that from time to time and probably more than is reported execs and other employees of everything from the government to the guys in the companies will play a sneaky on people and their bosses.
Noone is perfect, and they may think they can get away with stealing a litthe here, a little there, get to cocky, get caught and their totaled.
So it could be this, more likely the government made some mistake, and someone is being blamed for all of it.
While he may have stolen things, it now gives the government a reason to steal his data and so on and so on.
He may have been given the data by someone else who stole it from somewhere else.
After the snowden thing, the wikileaks thing and the way excuse th raceisum here every fucking fat american pig is going.
This reminds me of my parents home country indonesia.
This may be a first world democraticly elected group of wankers but they are still, fat, lazy fucking wankers and I don’t trust anyone.
Security wise, the government are all powerfull.
And therefor you should trust the government less than the hackers and spammers.
The government have all the rights, you don’t have any rights, because the government controls you and everything.
And while this is usually ok when they get it wrong they like to get rid of it.
And while we don’t go round killing and bombing whole citties when we get pissed, I sometimes wish we would be like isis or those that don’t sugarcoat things, we know they are all fraud but we never know where we stand because no one comes out and says it.
Saying that if trump gets in, thats probably going to be the end of any government, put it this way, there is no way he will ever leave if ever elected, he will be a dictator, and that probably means no constitution so who knows.
This is another degradation of freedom and service.
Then again, whats new.
There are to many breaches of security or trust for me to be supprised anymore, to many suits.
About the only reason we are not all slaves to the machine is probably because the monster corps find themselves more of a threat than us.
As long as it stays that way we are free but when it stopps we’re in for it!

Comments (0)

Government alleges former NSA contractor stole ‘astonishing quantity’ of classified data over 20 years

Hello folks,

Looking at some security news, and came across this. First, lets get these notations from the newsletter out of the way.


The court filings say the government recovered 50TB of media from Martin’s residence, not that he stole 50TB of data.  Many news organizations have erroneously made the leap that all of this is sensitive data, but that fact has not been disclosed in court filings.  Three extremely disturbing facts were revealed in the court filings.  First, Martin took hand written notes on printed classified documents that appear to have been explaining the context of the documents to an outsider.  Second, forensic artifacts suggest he communicated in Russian language on his computer.  Finally, investigators recovered a letter Martin wrote in 2007 to his coworkers which makes him appear extremely disgruntled.  All of these items seem to bolster the government’s case for pretrial confinement.


Nothing claims that all of the information is classified, and I didn’t read that in the article. There are several versions of this article in this newsletter, but we’re taking this one from the Washington Post and I think we should be aware of this.

If they do find that most of this information is classified, then I could see this guy to be a risk. It doesn’t seem to me he would, even if he has weapons and data, because unless you have proof he’s going to do something with it, there’s no need to worry. I’m curious on your thoughts. If you read the article, what do you think is going to happen?

Comments (0)

Yahoo asks feds to declassify surveillance demand

OK, I’m catching up on some security news i get via E-mail and saw Yahoo asks feds to declassify surveillance demand which may heolp explain why millions of accounts were breached, if they contained specific phraises they were looking for. While I run a network, I do not look at E-mail, I don’t have anything to scan E-mail, and the tools I do have do let me see E-mail in a way, but I have to look, and even that doesn’t give me the full message. I believe the tool I have would let me see subjects and identifiers, but i do not believe I can see the messages, and i believe its only outbound, but that doesn’t matter to me. I don’t believe in looking at other E-mail, there is plenty of other things to do.

Comments (0)

JFW 18 is coming, blind bargains has info on whats new

I haven’t been to blind bargains lately, but they post a lengthy blog post on whats new in version 18. I am not sure when it will be released, or if it has, but the post was posted on the 11th, and its better late than never. Maybe you’ll find this of interest.

Comments (1)

hackers hack dyndns

Hi.
I usually post lighter tech on a satturday, however this one was all over the net and it was not posted yet.
This comes from roiters.
If anything it shows that even with our most secure systems available, it is possible for hackers to take down the cloud.
Its hard, hundreds of infected computers and portables needed to be used but it can be done.
I coppied this from royters.
If you want a link search hackers hack dyn.
Dyn or dyndns, dynamic dns is a large address book managing a lot of sites including the amason aws s3 cloud, google, twitter and several online networks itunes, spotify, paypal and a few others.
For future refference a ddos or denile of service attack as was successfully done today is simply when you send as much data at a server or group of servers to overload and crash those servers.
While you can provent most breaches of this type the bad guys always are one step ahead.
It also demonstraits that a lot of users click links and download stuff they are not supposed to.
On the other side, us techs know that as long as we have dumb stupid users that get hacked we have jobs.
Though we would really like to play the latest game etc.
We would also prefur that we didn’t have as much work, but oh well we get payed still.
This news came on radio this morning during my gym session.
Cyber attacks disrupt PayPal, Twitter, other sites
By Joseph Menn, Jim Finkle and Dustin Volz
Hackers unleashed a complex attack on the internet through common devices like webcams and digital recorders and cut access to some of the world’s best known websites on Friday, a stunning breach of global internet stability.
The attacks struck Twitter, Paypal, Spotify and other customers of an infrastructure company in New Hampshire called Dyn, which acts as a switchboard for internet traffic.
The attackers used hundreds of thousands of internet-connected devices that had previously been infected with a malicious code that allowed them to cause outages that began in the Eastern United States and then spread to other parts of the country and Europe.
“The complexity of the attacks is what’s making it very challenging for us,” said Dyn’s chief strategy officer, Kyle York. The U.S. Department of Homeland Security and the Federal Bureau of Investigation said they were investigating.
The disruptions come at a time of unprecedented fears about the cyber threat in the United States, where hackers have breached political organizations and election agencies.
Friday’s outages were intermittent and varied by geography. Users complained they could not reach dozens of internet destinations including Mashable, CNN, the New York Times, the Wall Street Journal, Yelp and some businesses hosted by Amazon.com Inc.
Dyn said attacks were coming from millions of internet addresses, making it one of the largest attacks ever seen. Security experts said it was an especially potent type of distributed denial-of-service attack, or DDoS, in which attackers flood the targets with so much junk traffic that they freeze up.
VULNERABILITIES EXPLOITED
Dyn said that at least some of the malicious traffic was coming from connected devices, including webcams and digital video recorders, that had been infected with control software named Mirai. Security researchers have previously raised concerns that such connected devices, sometimes referred to as the Internet of Things, lack proper security.
The Mirai code was dumped on the internet about a month ago, and criminal groups are now charging to employ it in cyber attacks, said Allison Nixon, director of security research at Flashpoint, which was helping Dyn analyze the attack.
Dale Drew, chief security officer at communications provider Level 3, said that other networks of compromised machines were also used in Friday’s attack, suggesting that the perpetrator had rented access to several so-called botnets.
The attackers took advantage of traffic-routing services such as those offered by Alphabet Inc’s Google and Cisco Systems Inc’s OpenDNS to make it difficult for Dyn to root out bad traffic without also interfering with legitimate inquiries, Drew said.
“Dyn can’t simply block the (Internet Protocol) addresses they are seeing, because that would be blocking Google or OpenDNS,” said Matthew Prince, CEO of security and content delivery firm CloudFlare. “These are nasty attacks, some of the hardest to protect against.”
GOVERNMENT WARNED OF ATTACKS
Drew and Nixon both said that the makers of connected devices needed to do far more to make sure that the gadgets can be updated after security flaws are discovered.
Big businesses should also have multiple vendors for core services like routing internet traffic, and security experts said those Dyn customers with backup domain name service providers would have stayed reachable.
The Department of Homeland Security last week issued a warning about attacks from the Internet of Things, following the release of the code for Mirai.
Attacking a large domain name service provider like Dyn can create massive disruptions because such firms are responsible for forwarding large volumes of internet traffic.
Dyn said it had resolved one morning attack, which disrupted operations for about two hours, but disclosed a second a few hours later that was causing further disruptions. By Friday evening it was fighting a third.
Amazon’s web services division, one of the world’s biggest cloud computing companies, reported that the issue temporarily affected users in Western Europe. Twitter and some news sites could not be accessed by some users in London late on Friday evening.
PayPal Holdings Inc said that the outage prevented some customers in “certain regions” from making payments. It apologized for the inconvenience and said that its networks had not been hacked.
A month ago, security guru Bruce Schneier wrote that someone, probably a country, had been testing increasing levels of denial-of-service attacks against unnamed core internet infrastructure providers in what seemed like a test of capability.
Nixon said there was no reason to think a national government was behind Friday’s assaults, but attacks carried out on a for-hire basis are famously difficult to attribute.
the origional link is here
http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME

Comments (0)

updates this week

Hi all.
Microsoft released a preview update for october for the next month’s update.
It includes 4 things.
1. a new certificate for windows catalog which is being revamped.
2. an improvment to its diagnostics tracking through secured servers.
3. and 4.
Fixes to security updates which made things go nuts.
Some of these like the printer fixes are in 10 to so.
This roleup is for 7 and server 2008.
On codecguide.com adobe released stand alone installers for the flash player.
However I recomend users still use the web versions as for one thing they work and are accessible.
These just install and are done but when I tried on a test system it locked it up and the installer crashed after stating it was done.
At any case the web version installs fast you just need to kill those checkboxes before you install that file.
You can also customise your installer before you download it.
Next, ccleaner 5.23 is out.
For those using firefox it will install chrome on your system.
You will need to uninstall chrome, you should clear data, there is no firefox to change your web brouser to sadly.
SSo after you uninstall chrome you won’t be able to go online at all.
Run firefox from the run dialog and answer the question to use it as default then it works again.
Its a pitty piriform doesn’t have checkboxes like others do its just as well its a good program thats all.
On the articles front.
Everyone gets hacked during elections and yeah I agree with you office stuff especially mail needs to be safe.
Also remember where your flash drive was.
A security company left flash drives all over the place usually buy universities and offices.
They were researching if people would just pick them up.
They installed simulated ransomware and other things into computers and also got access to lots of info.
They conclude that people picking up what look to be free usb drives is a problem.
I do know for a fact my brother got infected with malware once from a drive he got at uni.
I also know that at uni people often left and lost their flash drives.
My brother told me that at least 10 drives would be left on the desk or floor of every room he went to.
I am unsure how we would fix things but keeping track of our stuff and putting it away when done maybe not leaving lids and stuff on our desk where they can be easily knocked would be a start.
One thing to do not use personal email for work as its logged.
Do not do banking or other things even if legal during work and don’t tweat either companies hate that during work and in fact block it.
I have people that pay bills at work I am not sure how good that is either.
Your boss doesn’t want you to serf the net while you are supposed to be working.

Comments (0)

Hackers Hit U.S. Senate GOP Committee

Hi folks, what a relief I am seeing this. Hackers Hit U.S. Senate GOP Committee is the name of the article and this goes to prove what types of things are going on. I did see things about the democrats being hacked, but eventually, the other side would be published I’m sure. Now, its just a matter of time before the whole election is rigged, and I’m proven right that it really doesn’t matter if we vote, the outside always influences it whether its money or hacking.

Comments (0)

Find Out What Threats Are Lurking in Your Office 365 Email

Hello everyone,

I think that things to make our lives easier is going to be a good thing, especially in the software field. When I saw Find Out What Threats Are Lurking in Your Office 365 Email it does not surprise me as a problem only because E-mail is involved. As long as E-mail is in it, it is always going to be a threat. We can protect ourselves by running scanners if available, and good old common sense.

  • Don’t open anything you are not expecting, even if it is from a known sender.
  • If you are expecting something, but the message looks suspicious, feel free to write the sender back for clarification. I’ve done this when resume’s for potential job applicants did not open, even though I did not publish any job postings within the network. I never got a mailback when telling them I could not open the file and to resend it.
  • If it is a known sender, know the writing patterns and know if they tell you whats attached to any type of E-mail.
  • If you are expecting a package, go to the trusted carrier site or amazon to verify any type of issues or status. I would never open any attachment indicating that there was a problem on the date it was sent, especially if I was not expecting any package.

You will always want to make sure you’re going to trusted sites, and thats harder to do now since any site can be hacked, even ones you trust. Please be careful out there.

Comments (0)

The Slashdot Interview With Security Expert Mikko Hypponen: ‘Backupception’

OK, here is an interview i hope you will find of interest. The Slashdot Interview With Security Expert Mikko Hypponen: ‘Backupception’ is in text and may be worth the read for new users.

Comments (0)

comments on the latest posts

Hi.
Yeah looks like I am a busy dood today and I havn’t even got through the catchup I have thought about getting at today.
So, I agree about us streaming to much.
We tweat to much in general.
Security asside do we the users be interested in who fucked who this morning or if you are going for a crap because you ate to much french fries?
We need to actually see what we as users post from the aspect of our viewers.
Its insecure, not smart, wastes bandwidth and drives away potential users.
I have friends that will block/ spam anyone that posts everything they do.
My cousin uses youtube to stream all the games he has done and stuff like that.
I have a blog I try to blog about a few things I do every week.
I have read journals and posts where I have learned about others that are now friends, and that well have lives that are not my own.
Learning such things as for example that in europe and places in the us, the boiler is extremely important is something I would never use here in new zealand, as our law of central heating is just well not up to standard, etc.
From time to time I doodle with junk things but its only when I am bored stiff.
One thing we and all social media previders need to define right is what a friend or a follower is.
For me a follower is someone that follows my post or that I follow that has an interestt, they can see my posts, and comment on them.
A friend should be the next level up from follower, they can have access to my contact info, my address, phone number, etc, can send me stuff, can come to my place, interact with me in all the ways etc.
In the basic friend level they can use my email address.
I can choose who can get access to that info.
So everyone can follow me.
But I need to be the one that initiates that friendship.
Maybe if I like their posts a lot, I may volinteer my email address via form or something to say they can be a basic friend.
It gets a bit more involved maybe I want an audio conversation, my skype.
After that that should probably be the limit of the social site, sure I can give out more info putting the messages out, and then maybe if I get a real friend we could be teamed up somehow.
The networks are not as suffisticated.
Firsttly, you don’t have any friends.
Right now a friend is someone who follows your posts and can talk to you, but they could be your friends, your enemies, a spam bot, a hacker, or a murderer.
There is no distinction on what a friend actually is.
Usually, I have people friend me and I don’t do that.
I do have people follow posts and say they like it.
If I know them I continue with them.
I will if I want to talk to them get a skype contact for audio.
And email for chatting.
Rarely do I actually give out more info.
If they say they are from my country, then I do give my phone number and they will give them mine then its outside the digital net sphere and after that anything goes.
While my digital username, skype and email address are fair game, I don’t much care who gets those, I wouldn’t want my cell, phone or address to come out for use at all.
Even when I get an international job, I don’t give them out unless I get an official legal requests with an official terms aggreement which I can read.
This is not 1999.
Last week a user on my net of friends, got bored and setup a public ftp just to see what past his door.
For me it was harmless fun.
I got some midi music and a few audio recordings and found out about some artests I never knew about.
However for others it was cracks, ransomware and other junk which made it on there, the server is dad now.
But I got what I wanted out of it.
Now I just need to kill the dammaged data files and see what I got but still.
One thing I have noticed net wize is the fact it closely mirrors the real world.
To close.
There are a few different rules.
1. cops, there are some but not many.
2. security, there is, but not as much as you’d think or like.
3. robbers, there are a lot of those.
4. tourists, a lot of those to.
5. terrorists, same as 4.
6. people that just are like you or me, same as above.
7. adds, yes and spam bots, more junk than is necessary etc, etc.
On the net, you are a name, a number, an ip link.
You are probably someone but who knows what you are actually.
You never sleep, never eat, never feel the sun, you do what you have done.
Some have jobs but not everything costs.
You don’t eat either.
Now, thats fine and all, but when this world crashes with ours, and since we don’t know how to use the virtual world right sometimes it leaks more often than not into our world it makes a mess.’
THe yahoo breach, yeah, yahoo is going to ditch all its mail next year local isps are moving cloud servers back home.
On the gaming front, I do think what needs to happen is simply have more security on these games, if a hacker wants in he will get in, the same is with a burglar or other such bad guy, the net is the same as the real world.
We just have a few more classes of badys out there thats all.
One thing we need to do is treat the net the same as the eal world to some extent we do but not enough.
The risks havn’t gone up, it would be like lumping all the world into a room, we have the seedy bit of the world and the good part.
Its dangerous if you are not carefull, etc, same is usual on the net.
In most cases everyone has their lives and some want to be your friends, but you wouldn’t trust all, etc.
Not all real world laws, like copywrite, privacy, etc will work as they do on the net, and not all net rules will quite work outside of it.
With the net becoming part of our world, we will have to start treating it as such and modifying our laws else we will have conflict.
Privacy as it stands with the event of the net is no more.
Copywrite as it stands with the net is no more though we are trying to adapt that some what.
With privacy, there are still those that believe that it should remain the same as it always was and means, thats not the same really.
With some of the non incrimental services, you can’t for example turn your real friends on and off, you can’t kill them then say you didn’t mean it etc.
On the net you can just do that and it doesn’t mesh right.
If I have to read into this we still have a long way to go.

Comments (0)

Teens Are Live Streaming More Than Ever: The Security Risks

I just read this article entitled Teens Are Live Streaming More Than Ever: The Security Risks and we do need to teach our younger friends about the types of things they’ll encounter now. The landscape has definitely changed since we were kids, and it is definitely not the same. We’ve got so much to worry about now on the net, we just keep busy with whats happening and don’t think about it.

The big question is what should we be telling our young teens and tweens? I think we should tell them that it is not the same as we used it in the 90s and early 2000s. There is a lot more danger, and posting everything isn’t going to be a good idea.

I sure don’t post about everything, even when i was at a previous employer. While that employer in question didn’t pay much, there was a risk of me posting about everything, as it could come back to bite me later on. While I wasn’t happy, posting about everything just wasn’t going to solve anything, and kids should know that posting video about every fight, every little thing they do, may be a problem later. You just don’t know who you’re going to come across later, and you just don’t want to have that risk later.

What are your thoughts? Sound off in the comments.

Comments (0)

Yahoo and their big breach

Hi folks,

I want to give my thoughts in regards to Yahoo and their biggest breach of many millions of Yahoo accounts. While I’ve read the blogs from my RSS feeds talking about it, and also heard Steve Gibson on a recent Security Now, I left Yahoo a long time ago. While SBC let me link to my Yahoo account years ago, the things on my SBC Yahoo account are staying, but I haven’t really used that address for communication purposes in years.

Ever since I got jaredrimer.net, I slowly got things away from SBC. There are a few lists I’m on with Yahoo and SBC, one is an oldies list I look at occasionally, NBP’s E-mail list, the Clippers E-mail list, and the Los Angeles Kings E-mail list. I’ve moved everyone else over to my domain for contact.

This was done because I’m not at home checking E-mail, and SBC was not one of the addresses by choice I did not put on my phone. There are several addresses I have not put on my phone, but the important ones I have.

This was a decision i had made long before news of the Yahoo breach ever came to lite. Its recommended to abandon the account, and for the most part, I have, except for these E-mail lists which people can have.

What will the Yahoo breach do to people? Yahoo hasn’t been doing much as far as I’m aware for years. Yahoo news is still around, but even KNX has changed the way their site runs with a blog format and other video and app options through CBS.

What is really sad about this breach is that it is a two year old breach now coming to lite. If I can, I’m going to try and get these newsletters on my lists account over on jaredrimer.net and forget SBC Yahoo altogether. Next time newsletters come around, I’m going to start changing things around here.

I know that Yahoo doesn’t just power SBC global, what are other providers doing that can link their addresses to Yahoo? What are you doing with your yahoo account now?

Please sound off in the comments. The boards await you.

Comments (0)

Tech 251 now out

Hi folks, just released tech 251 on the rss feed talking about audio boom.

Comments (0)

phones and reading

Hi jared and all.
Well, read through the
articles.
One thing that interests me is do they mean online gaming such as gambling of disreputable sites or do they mean online gaming in general.
A lot of games now days call of duty, etc have a crappy story but are meant for online team play.
Pear to pear, via ip, via game subscription or via central server with subscription.
A lot of people do it.
The password one is interesting.
I have a password for my bank, my paypal account, my wireless, my twitter, my blog, this one and my wordpress share a word I think all free sites have one of 6 different passwords based on importance.
Remembering this stuff is a challenge.
I know, I should get keepass or something to mange things but I just never get round to it.
My dad has loads of passwords written down and so does my mum, I have had to spend days changing all the passwords because I can’t remember them and or havn’t used the account often enough to remember what that is.

On to my reads for this week.
As you may or may not be aware samsung has been having issues with its note7 devices.
All devices are now recalled, and production is off till samsung can see what the heck it fucked up this time.
Shortly after that civil aviation followed up with the fact that it is an offence punnished by fine and jail if you carry one of these onto an aircraft.
Over 2 million devices have been recalled.
Further on this thing, everyone has failed products even microsoft has bad days however this is the biggest failing and its happened twice.
Apple sales will be going up its prodicted.
Google is releasing a new phone called the picsel.
It is supposed to be a good phone, coolblindtech.com has details on how narly this thing actually is.
There is already a cool pair of headphones for it.
the orbit reader 20 the new 300 dollar braille display is getting closer to its release.
Tidbits of information were released on aph this week including its manual and technical guides.
Well one of its test group released an recording of the prototype.
https://dl.dropboxusercontent.com/u/545 … _00_58.ogg?dl=1
Google has released new updates to its voice assistants including updates to its chromecast line of products with a home device aimed to control just about everything.
Android 7.1 has been made exclusively for the new google lineup and will come out to other phones at some point as will its new headphones.
Its also rumored that google are entering the vr market or stepping it up some.

As a further edit to the posts, its been confirmed via ent gadget, that after its recalls, samsung retested all their batteries in house and found they had a problem maybe but others by another company didn’t seem to.
They have just retested every battery for all their devices and they are not blowing up.
Its not the batteries.
It may be just the latest note device or thats how I read into it.
So far those that certify their stuff say that everything checked out, this is the first time there was an issue.
So I read it as being a device problem rather than a battery problem.
At least this narrows it down some what.
Its either software or hardware.
Both things will need to be checked, but the battery packs should be fine.
On another tangent news on tv had an expert interviewed, and he said that we should have had all our phones exploding on us because of the large amount of cpu power used, the fact the heat energy needs to go somewhere.
As you know in the older days your average 386 and lower laptop had no fans or anything.
Even the units up to the first duel cores didn’t have fans that went all the time.
Now my latest i5 has a fan that runs all the time.
Luggables had fans as well as desktops, however cellphones don’t have them.
Saying that if its in a case it would overheat anyway, and a fan would use a lot of power, but there is no argument that when under massive load our phones get really hot.
Even in the older days people were up in arms about radiation dammage from the then week non smart devices, so this may be the start of us realising the old coolent technology that powers our new generation of smart computers just doesn’t cut it anymore.
This would actually make sence, our smart phones are now minni computers, and computers especially 64 bit units no matter the size of their cpus generate heat and that heat needs to go somewhere.
Maybe one day someone will make a machine where you could fry an egg or make coffee from your phone, use the heat to recharge a battery or even power something.
Right now all heat does is destroy the devices.

Comments (1)

Some of what I’ve been reading the past few days

Hi folks,

Its been awhile since I’ve posted about what I’ve read, and I’ll try to post some of the highlights of what I think people should check out. This won’t be an exaustive list, however, this will be things that I think you should read in the tech field. I do tweet what is interesting, but some of my twitter may not meet your needs, so i’ve posted the tech stuff and compiled it here. Hope you enjoy the list, and leave those thoughts.

  • 5 Things You Need to Know About the Threat of Election Hacking Safe and Savvy Blog On October 14, 2016 I read this article and its almost election time. Definitely some very interesting things coming, and do we really know if the election is going to be controled by bots swaying people based on retweets or the like? I guess we’ll find out over time.
  • October is cyber security month, and various blogs are doing blog posts talking about various things. This one is from Last Pass and The Password Paradox: What’s With Our Risky Online Behavior? All of these types of posts talking about every day habits we do should be read to change our behavior. I agree with what this article is talking about, because even i have similar passwords for accounts I don’t much care about like IFTT, but yet I have an 8 character password with numbers and letters just the same. This password is not word generated, but yet, I can see if someone tried to guess it I’d be screwed. I should run the lastpass security challenge, as there could be multiple sites that do have the same password, and I do need to change that behavior in lite of recently known breaches which are not known to go away.
  • I ended up looking up phishlabs after they have E-mailed us in regards to some issues, and I’ve subscribed to their blog to learn how we can protect users from Phishing. It has to do with user awareness and training, and I like their work. This time, All Phish are Not Created Equal: The Evolving BEC Scam and it is true. Phishing, as you all are aware, talks you in to divulging information because the E-mail claims that you are a winner of a prize, you may have missed a package, you need to review this shipper to go get your package, all sorts of things of this nature. Some of this can lead to malware or now, ransomware. I briefly talked about this in this work awareness course i’m on my 4th time taking, and there have been some changes, but the same thing as I remember it. This time, i did talk about ransomware, and the multi-part series that I posted.
  • In the DNS department, Trend Micro posted on Octoberr 13 about a vulnerability in bind. I did not know that this was a system done by Berklee, so this is something new. The vulnerability isn’t good, as if we update server information or change something in the records for the domain, Bind takes care of it. For example, if I created test.jaredrimer.net on jaredrimer.net, bind would create the sub domain and bind it to the domain on the account. The article: A Look at the BIND Vulnerability: CVE-2016-2776 and it is a good read. I am not sure how we are updated, but I am going to make sure my provider sees this one in a few days. I just need to find out and call them in regards to how I should report such things so they can update things or notify the cpanel company or how this all works so we can stay as safe as possible.
  • This next one posted yesterday that I saw comes from our good friend Brian Krebs. IoT Devices as Proxies for Cybercrime is the article, and it is a good read as it talks about how Brian may have been attacked with this massive 620gb flood which forced him off the net. It also talks about the massive amounts of devices that are now coming online and the fact we do not necessarily have much knowledge of it once it is connected. The issue we have is that we don’t change the default credentials, and that is part of the problem.
  • Phishlabs talks about the data breaches and where they begin. Rewinding the Headline: Where Do Data Breaches Begin? This article was posted on the 12th, and it was a great read. If you want to take a look at this one, you may.
  • There are several blog postings talking about the monthly patches of Windows. October Patch Tuesday: Microsoft Releases 10 Security Bulletins, Five Rated Critical is one and Microsoft: No More Pick-and-Choose Patching is the other. One from Trend Micro which is more detailed and we talk about what is in the rollups, and Brian talks about the rollups and Adobe’s updates as well. If you really want a third article, read October 2016 – A brave new world of security updates which is also detailed as well.
  • Two different articles talking about gaming and cybercrime which overlap each other which I think you should look at. Funding Cybercrime: The Hidden Side of Online Gaming and Online Gaming Currency Abuse by Cybercriminals are the articles and both sort of overlap and was posted on the 11th. You may only want to read one of these articles, but the choice is yours.
    >

  • In the legal vs tech department, you better check What A Murfreesboro Court Case Tells Us because Ubber and Lyft both use apps to book your rides. This is good to see, and we’ll see what happens with this one.

I am looking for your comments on some if not all of these articles. If you want to do an audio segment on your thoughts, and you want to submit, please let me know and i’ll see what I can do. I want to try and post daily, but I just don’t have time anymore, but looking to change this. Thanks for reading and we’ll chat later.

Comments (0)

Older Posts »

go to sections menu


navigation menu

go to sections menu